
Summary
This detection rule monitors execution of various Windows-based hacking tools by tracking their import hashes (imphash). It captures instances of these tools even if their file names have been altered, enhancing the ability to detect potentially malicious activities associated with these tools. The rule focuses on specific imphashes that correspond to known hacktools, ensuring that legitimate applications are not mistakenly flagged. It serves as a critical alert mechanism by identifying the use of tools that may be employed in credential theft and other attack vectors.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-03-04